Computer Science
Access Control
100%
Attribute-Based Encryption
100%
Blind Signature
100%
Bloom Filter
33%
Communication Complexity
16%
Computational Cost
12%
Control Requirement
12%
Encryption Scheme
37%
Enhancing Technology
50%
Formal Definition
50%
Fundamental Problem
16%
Grained Access Control
25%
Information System
100%
Intelligent Transportation System
25%
Malicious Behavior
25%
Multiple Domain
12%
Pathological Case
50%
Plaintext Data
12%
Practical Solution
16%
Privacy Preserving
100%
Privacy Requirement
25%
Privacy-Preserving Technique
16%
Private Set Intersection
100%
Research Community
16%
Robust Solution
25%
Security and Privacy
25%
Security Requirements
25%
System Calls
100%
Use Case
16%
vehicular ad-hoc network
100%
Vehicular Network
25%
Keyphrases
Attribute-based Encryption
100%
Attribute-based Encryption Scheme
60%
Blind Signature
66%
Bloom Filter
33%
Communication Complexity
16%
Cryptographic Approach
20%
Fine-grained Access Control
40%
Indistinguishability
33%
Multi-authority
20%
Multi-party Setting
83%
Network Safety
20%
Pairing-based
100%
Plaintext Data
20%
Privacy Engineering
100%
Privacy Management
50%
Private Set Intersection
100%
Secure Access Control
20%
Security Assurance
20%
Semi-honest Model
16%
Set Operations
16%
Strong Security
20%